Skip to main content
Log in

A Survey of Mathematical Methods for Security Analysis of Cyberphysical Systems

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

This paper provides a detailed survey of various mathematical methods for security analysis of a new type of complex systems – cyberphysical systems, as well as digital production and digital economy systems. Considered methods are divided into three classes: methods for security assessment, methods for detecting cyber attacks and methods for analyzing the state of complex systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

REFERENCES

  1. Lavrova, D., Poltavtseva, M., and Shtyrkina, A., Security analysis of cyber-physical systems network infrastructure, 2018 IEEE Industrial Cyber-Physical Systems (ICPS), 2018, pp. 818–823.

    Google Scholar 

  2. Stepanova, T., Pechenkin, A., and Lavrova, D., Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems, Proceedings of the 8th International Conference on Security of Information and Networks, 2015, pp. 142–149.

  3. Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917.

    Article  Google Scholar 

  4. Zegzhda, D., Lavrova, D., and Khushkeev, A., Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series, 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS), 2019, pp. 780–784.

  5. Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 2, pp. 196–204.

  6. Moreno, G., et al., Multifractal analysis of soil surface roughness, Vadose Zone J., 2007, vol. 7, no. 2, pp. 512–520.

    Article  Google Scholar 

  7. Kirichenko, L.O., Comparative multifractal analysis of time series by the methods of detrended fluctuation analysis and maximums of the wavelet transform modules, Autom. Control Syst. Autom. Devices, 2011, no. 157, pp. 66–77.

  8. Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 9–15.

    Google Scholar 

  9. Sheluhin, O.I. and Atayero, A.A., Detection of DoS and DDoS attacks in information communication networks with discrete wavelet analysis, Int. J. Comput. Sci. Inf. Secur., 2012, vol. 10, no. 1, p. 53.

    Google Scholar 

  10. Lavrova, D.S., Forecasting the state of components of smart grids for early detection of cyberattacks, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1023–1025.

    Article  Google Scholar 

  11. Kalman, R.E., A new approach to linear filtering and prediction problems, J. Basic Eng., 1960, vol. 82, no. 1, pp. 35–45.

    Article  MathSciNet  Google Scholar 

  12. Lavrova, D.S., Zaitseva, E.A., and Zegzhda, D.P., Approach to presenting network infrastructure of cyberphysical systems to minimize the cyberattack neutralization time, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 387–392.

    Article  Google Scholar 

  13. Lavrova, D.S., An approach to developing the SIEM system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673–681.

    Article  Google Scholar 

  14. Pavlenko, E.Yu., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829–834.

    Article  Google Scholar 

  15. Zegzhda, P., Zegzhda, D., Pavlenko, E., and Dremov, A., Detecting Android application malicious behaviors based on the analysis of control flows and data flows, Proceedings of the 10th International Conference on Security of Information and Networks, 2017, pp. 280–283.

Download references

Funding

The study was carried out as part of a scholarship of the President of the Russian Federation to young scientists and graduate sdudents SP-1689.2019.5.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Yu. Pavlenko.

Ethics declarations

The authors declare that they have no conflicts of interest.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fatin, A.D., Pavlenko, E.Y. & Poltavtseva, M.A. A Survey of Mathematical Methods for Security Analysis of Cyberphysical Systems. Aut. Control Comp. Sci. 54, 983–987 (2020). https://doi.org/10.3103/S014641162008012X

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S014641162008012X

Keywords:

Navigation